The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is a new model of information Technology. It has drastically changed the way information technology services are used in organizations. Cloud computing technology can be used to provide good solutions for higher education institutions (HEIs). Despite the features of using cloud computing technology in education sector, however, still many of HEIs have not fully benefited from cloud...
Implementation of Outcomes Based Education (OBE) is compulsory requirement by Malaysian Qualifications Agency as importance criteria to give accreditation for campuses in Malaysia. OBE is a philosophy in education that more focused on output of learning outcomes rather than input, it is involved Course Learning Outcomes (CLO) and Program Learning Outcomes (PLO) as a component in OBE, measurement of...
Intensive worldwide effort is speeding up the developments in the establishment of a global surveillance network for combating pandemics of emerging infectious disease. However, there is no delivery platform available to send accurate and just-in-time disease information to reach out to the community. The public can only obtain information from the newspaper, radio or social media, which sometimes...
The quantity of data transmitted in the network intensified rapidly with the increased dependency on social media applications, sensors for data acquisitions and smartphones utilizations. Typically, such data is unstructured and originates from multiple sources in different format. Consequently, the abstraction of data for rendering is difficult, that lead to the development of a computing system...
Crosswinds are one of the natural disasters that pose risks to high-profile vehicles especially on the highway. There are possibilities of fatal accidents when drivers and motorists failed to control their vehicles when this dangerous wind blows perpendicular to the vehicles. Even though, each area of the crosswinds is placed with crosswinds signs (i.e. windsocks) but these signs are not so obvious...
Thermal comfort has been the subject for application in the design of a smart house in recent years. With dwellers demanding better eco-friendly operation of the house, minimizing energy is a rising concern in the development of a model house. In this work, we intend to focus on occupancy driven control of house cooling for maintaining thermal comfort. To cater for more advance analysis, a first-order...
Rapid growth of technology allows people to communicate electronically, but information privacy is not everyone that is aware of. Apparently, users may depend on solely encryption or data hiding, without realising our private message also can be exposed and tempered by the malicious user. This paper presents a hybrid approach of cryptographic approach before hiding the encrypted message into a cover...
The goals of this system is to develop an automated and interactive evaluation system to assist Final Year Project (FYP) assessors during the events of project evaluations. The system will enable the assessors to key in the student's marks into the application and the results will be produced automatically by the system in real time. This could support a paper-less process and environment. The system...
The increasing amount of network traffic threat may originates from various sources, that can led to a higher probability for an organization to be exposed to intruder. Security mechanism such as Intrusion Detection System (IDS) is significant to alleviate such issue. Despite the ability of IDS to detect, some of the anomaly traffic may not be effectively detected. As such, it is vital the IDS algorithm...
Location-based services application in indoor environment utilizing Wi-Fi Received Signal Strength (RSS) is recently prevalent in pervasive computing applications. It is used as an enabler of various location based personal services with handheld and wearable communication devices. This paper present a design guideline for the benefits of the society who wish to employ invariant RSS-based localization...
True Muslims around the world believe in Al Quran and Hadith. Al Quran is the principal religious text of Islam, a revelation from Allah. Hadith is also one of the fundamental sources of Islamic references and guidance for the Muslims after the Holy Book, Al-Quran. Hadith is referred to a report, statement, act, story, narration or discourse. Hadith, originally in Arabic, covers a wide range of issues...
One can recognize today's world as a place full of threats. Every field is vulnerable to threat, be it banking, education, government or medical. In health sector Wearable Computing and Smart Wearable Devices are gaining popularity. With this emerging success of these devices, the risk of threat is also increasing rapidly. People who are disabled, aged or children can get update about their health...
The procedure for counting colonies is often performed manually and the process is lengthy and tedious. For that reason, several methods that rely on digital images for automatically counting cells and bacteria colonies have been proposed. Fully automated and high throughput hardware imaging instruments are also available, but such machines are extremely costly. In this paper, we introduce a mobile...
This paper describes a preliminary study for proposing a viable mesh network communication for knowledge sharing platform. This network structure is to support military infantry personnel for utilizing mobile knowledge based system in restricted operation areas. The study investigates several components for implementing an effective and efficient closed network structure. Closed and secure are among...
Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students. QR code technology is the best technology to solve the problems faced by the current system. The system is capable of decod QR, information display and transmission of information...
This study is aimed for developing a framework of usability metrics specifically for assessing usability in mobile applications. This study is design to achieve fifteen major attributes: accurateness; attractiveness; behaviorness; cognitive load; effectiveness; efficiency; effortlessness; errors; learnability; memorability; operability; satisfaction; steadiness; timeliness; and understandability....
This paper is to discuss on the effective use of simulation technology in the leadership teaching and learning at Institute of Higher Learning (IHL). This methodology is used to improve the leadership ability of the graduates at National Defence University of Malaysia (NDUM). It also enables the assessment of students' generic skills in the areas of practicals, communications, teamwork, work ethics,...
This research is proposing for a new usability heuristics in the context of control features on mobile games for the use of touchscreen devices. Usability is the ease of use and learnability of a human-made object while heuristics generic name for a set of techniques that involve inspectors examining the user interface to check whether it complies with a set of design principles. Due to small size...
Risk assessment is a vital for any industry to characterize the hazards and decision making on its control options. Risk assessment comprise 3 stages of process which are risk identification, risk estimation and risk evaluation. In the case of seaport terminal operation, it is crucial for seaport to determine possible risks. This study review a qualitative decision making method known as Analytic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.